Messaging app Confide, which was last year bragged as a popular pick in Trump’s White House for staff wanting to leak intel to the press, has added be protected against screenshotting to its iOS app.
The iOS app previously threw some limitations on how users could screenshot materials when using the app — but full anti-screenshotting tech was limited to its Android app.
Not anymore, says co-founder Jon Brod. “ScreenShield is a accumulation of several different technologies that work together to prevent numerous screenshots and screen preserving proficiencies, ” he says, considering the brand-new feature.
“There are many the resources necessary to captivate a screenshot or make a screen entering on iOS, and each method asks different handling. One of the newest avoidance technologies that we added to our toolkit utilizes the same content protection APIs once used by Netflix, iTunes Movies, and other video streaming apps. We have built upon the underlying engineering to prevent capture of other media kinds including verse, photos, substantiates, stickers, and more. Importantly, we are only consuming public iOS APIs in our ScreenShield technology.”
Anti-screenshotting technology like this is really exactly security theatre, of course.
Not least because all it makes is a second device, unconnected but in close proximity to the firstly, to click apart and enter its on-screen materials regardless.
Even so, Brod claims there’s still cost in the aspect, despite such an self-evident loophole. “While nothing is 100% foolproof, we imagine the combination of our end-to-end encryption, ephemerality, and now complete screenshot-prevention forms Confide the most private and reassuring messenger available, ” he claims.
However rather more serious indictments of flawed defence were leveled at the messaging programme last March — when researchers displayed it was possible to intercept encrypted Confide meanings, and claimed the programme could in fact decrypt and read users’ missives( rather undermining its end-to-end encryption assert ).
Asked about that is something that, Brod says all the security issues raised by the researchers were addressed “in a timely manner as soon as they were reported to us last year”.
“Confide used safe codes, which are a cryptographic hash that includes all public encryption keys for an accounting. Consumers can substantiate the keys used by Confide‘s end-to-end encryption by ensuring that the safety code displayed on their device accords the one displayed on their contacts’ machine. We too allow users to be notified if the security system for one of their contacts changes, ” he tells us.
“We likewise underwent a exhaustive third-party defence examine including blackbox, greybox and whitebox testing, embracing both the client and server. The ministerial epitome of the audit is published on our place.”
And while a third-party audit is a hospitality growth, the presence of such serious blunders in Confide’s crypto implementation in the first place stands concerning.
And for anyone with ongoing concerns about the robustness of its crypto, other end-to-end encrypted messaging apps are available.